Big companies regularly get their security posture assessed for weak links. To that end, they invite penetration testers who try to compromise the organizations’ IT infrastructure and gain access to proprietary sensitive information. This proactive strategy aims at giving the management an idea of what improvements can be made to better protect the company against […]
Comcast Will Keep Ignoring You
Internet and TV provider, Comcast, have a huge hold on a lot of territory. Not just digital territory, but physical space. Many addresses only have access to high power internet through Comcast. They’ve recognized this and have used it to their advantage in having a legitimate monopoly. When you wait on the phone or in […]